Abstract is missing.
- New Results in Linear Cryptanalysis of RC5Ali Aydin Selçuk. 1-16 [doi]
- Higher Order Differential Attak of CAST CipherShiho Moriai, Takeshi Shimoyama, Toshinobu Kaneko. 17-31 [doi]
- Cryptanalysis of TWOPRIMEDon Coppersmith, David Wagner, Bruce Schneier, John Kelsey. 32-48 [doi]
- JEROBOAMHervé Chabanne, Emmanuel Michon. 49-59 [doi]
- Fast Hashing and Stream Encryption with PANAMAJoan Daemen, Craig S. K. Clapp. 60-74 [doi]
- Joint Hardware / Software Design of a Fast Stream CipherCraig S. K. Clapp. 75-92 [doi]
- On the Security of the Hashing Scheme Based on SL::2::Kanat S. Abdukhalikov, Chul Kim. 93-102 [doi]
- About Feistel Schemes with Six (or More) RoundsJacques Patarin. 103-121 [doi]
- Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYsAdam Young, Moti Yung. 122-133 [doi]
- MRD HashingReihaneh Safavi-Naini, Shahram Bakhtiari, Chris Charnes. 134-149 [doi]
- New Constructions for Secure Hash FunctionsWilliam Aiello, Stuart Haber, Ramarathnam Venkatesan. 150-167 [doi]
- Cryptanalytic Attacks on Pseudorandom Number GeneratorsJohn Kelsey, Bruce Schneier, David Wagner, Chris Hall. 168-188 [doi]
- CS-CipherJacques Stern, Serge Vaudenay. 189-205 [doi]
- On the Design and Security of RC2Lars R. Knudsen, Vincent Rijmen, Ronald L. Rivest, Matthew J. B. Robshaw. 206-221 [doi]
- Serpent: A New Block Cipher ProposalEli Biham, Ross J. Anderson, Lars R. Knudsen. 222-238 [doi]
- Attacking Triple EncryptionStefan Lucks. 239-253 [doi]
- Cryptanalysis of Some Recently-Proposed Multiple Modes of OperationDavid Wagner. 254-269 [doi]
- Differential Cryptanalysis of the ICE Encryption AlgorithmBart Van Rompay, Lars R. Knudsen, Vincent Rijmen. 270-283 [doi]
- The First Two Rounds of MD4 are Not One-WayHans Dobbertin. 284-292 [doi]
- Differential Cryptanalysis of KHFDavid Wagner. 293-296 [doi]